60-Seconds #312 : The Age of Bad Photography

Ever since the social networking fad hit the internet a new genre of photography has become the most popular form of photography in history. It's called "BAD" photography. And since we're sick of seeing bad photography -- there are the Top 24 Photos We Wish We Didn't Have To Look At May 30, 2014

60 Seconds #311: A Font called Pinto makes a great Happy Easter Card

I got this post to the web site today and had to pass it along. Georg Herold-Wildfellner logged into the Design Center from Vienna Austria and used our contact link to say Happy Easter Graphic-Design! He sent an EASTER card to introduce his new font called * PINTO * ... nice idea, fun font, an email marketing campaign gone RIGHT! April 17, 2014

60-Seconds 302: Should we colorize history?

Our good friend Chuck Green recently made a post to Facebook about the digital colorization of historical photographs. His complaint was followed by a ponderous tome of learned comments from both sides of the isle. An alarm went off in my head. I'm thinking; hey, everyone already knows about that -- but then, do they? So I went digging for all the "Digital Ethics" information that I've written about since the late 1980s and discovered -- OMG: over a decade has gone by! These "newbies" could very well not be informed about Digital Ethics. November 13, 2013

What happens to your digital estate and online holdings when you die?

Have you planned your online estate? While nobody wants to talk or think about their own death, you owe it to the ones left behind to do some serious planning. My estate planning attorney says treat that just about like any other property you own. That's the starting point. Although your digital estate carries its own set of rules, it needs careful, accurate estate planning just like your real-life estate. April 21, 2013

Blacklisting, Whitelisting and the Way Forward: Comments on the Schneier-Ranum Face-Off

In this 60-Second Window, I step aside for George Tubin, Trusteer's Senior Security Strategist on the matter of how we face the looming storm of cyber security and the coming spector of cyber war. Nobody wants it, but there seems to be an ever increasing debate over how to avoid it. These figures figure heavily into the debate, and the future of our digital infrastructure. March 27, 2013

Printing Code: Programming and the Visual Arts, Rune Madsen at Heroku's Waza 2013

A lot of people think there's a brick wall between creative designers and web coders. This remarkable video featuring Rune Madsen at Heroku's Waza 2013 is proof that there is no barrier between code and art, so long as the practitioner has vision and creativity ... please enjoy this hugely enjoyable video! March 11, 2013

Unlocking Cell Phones : Statement from the Library of Congress and the White House

I don't know if any of you have been following this ruling, and the resulting national petition, but it's a rather interesting step toward the future. Back in October 2012, the Librarian of Congress decided that unlocking of cell phones would be removed from the exceptions to the DMCA. As of January 26, consumers are no longer able to unlock their phones for use on a different network without carrier permission, even after their contract has expired. But now read this from the White House . . . March 5, 2013

False Advertising ???

True or False: Designers have disappeared from the web advertising world because they're no longer needed -- who needs a designer when you can blatantly use false advertising to entrap your audience to click. Good question? Have you fallen prey to this ploy? February 23, 2013

Spectacular Vertical Gardens

I find inspiration in all sorts of places . . . even some you may not consider. How about graphic design as it is applied to a vertical landscape of color, shape and texture . . . these vertical gardens are actually paintings that affect the spaces they occupy. Is this 'design' ... you bet! Truly creative, and truly inspiring. Enjoy! February 7, 2013

nCircle predicts exploits, security threats and hacks will mutate in 2013

Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year -- and beyond -- he predicts, will be a time of highly adaptive security threats, with four main strands - cyber-criminals, cyber-terrorists, political hacktivists and rogue employees -- conspiring to create severe headaches for IT security professionals in all classes of public and private sector industries. December 22, 2012